|
Volumn 3027, Issue , 2004, Pages 20-39
|
Positive results and techniques for obfuscation
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESS CONTROL;
APPLICATION PROGRAMS;
CRYPTOGRAPHY;
DISTRIBUTED COMPUTER SYSTEMS;
PUBLIC KEY CRYPTOGRAPHY;
CONTROL FUNCTIONALITY;
CONTROLLED DELEGATIONS;
CRYPTOGRAPHIC APPLICATIONS;
HOMOMORPHIC PUBLIC KEY ENCRYPTION;
IMPOSSIBILITY RESULTS;
PRIVATE-KEY ENCRYPTION;
PUBLIC-KEY ENCRYPTION;
RANDOM ORACLE MODEL;
PROGRAM COMPILERS;
|
EID: 35048895442
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-540-24676-3_2 Document Type: Article |
Times cited : (168)
|
References (8)
|